Clients have cut admin time by 80% after implementing the application. Once set up the application runs itself. The application will also save on money and paper.
You can be up and running within minutes. The intuitive layout makes it easy to set up and we offer comprehensive help articles. In training we go through the different set up options and go through your booking scenarios to set up the application to your needs. We also provide templates for confirmation and invoices. If integrating with a bank you will need to contact your bank to set up your merchant terminal if you don’t already have one. For most banks this can take upto 10 business days.
No. Client data is NOT the property of iSmart Software and we do not keep copies of client data. Clients can request a physical back up of their data at any time. On request or termination of an agreement, we sanitize all client data.
Yes. To best respond in a disaster situation our infrastructure includes instance redundancy, use of multiple availability zones within a region, load balancing, auto scaling, monitoring and recovery. Our disaster recovery plan is tested regularly across a multitude of scenarios including power loss, virus attack etc.
- BPoint – Commonwealth Bank of Australia
- NAB Transact – National Australia Bank
- MiGS – ANZ eGate (NZ) and Bendigo Bank
- PayWay – WestPac
iSmart Software is PCI Compliant as a Level 2 Service Provider. We do not store Credit Card details – only transmit.
iSmart Software is committed to securing all our products, services and customer information. We secure your information and database at top tier Amazon Web Services who control the physical and environmental components of security. We employ the industry standards in our development process. Our application design and development take into consideration the identified risks are regularly reviewed. This benchmark ensures our software is safe, secure and reliable. Access into the application in handled by password authentication and limited by role based control. All administrative, user, critical and key business transactions are logged and recorded to build a historical audit trail.
Please contact us if you have any further questions.